Patents by Inventor Sandeep REDDY
Sandeep REDDY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11980005Abstract: In one embodiment, an apparatus includes a chassis base, a printed circuit board mounted on the chassis base, a heatsink positioned over the printed circuit board to prevent corrosion of components on the printed circuit board, wherein the heatsink comprises a plurality of upward extending fins and a plurality of downward extending walls, a seal interposed between an edge of the downward extending walls and the chassis base, and a cover extending over the heatsink.Type: GrantFiled: November 17, 2021Date of Patent: May 7, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Mehmet Onder Cap, Manigandan Boopalan, Joel Richard Goergen, Sandeep Mehdiratta, Manjunatha Reddy Shivashankara, Damaruganath Pinjala
-
Patent number: 11972114Abstract: A set of threshold voltage distribution width measurements are obtained for a block in a memory device. An endurance estimate is determined for the block based on the threshold voltage distribution width measurements. The endurance estimate comprises an indication of an estimated number of program/erase cycles during which data can be reliably stored by the block. One or more parameters of the block are managed based on the endurance estimate.Type: GrantFiled: July 18, 2022Date of Patent: April 30, 2024Assignee: Micron Technology, Inc.Inventors: Sandeep Reddy Kadasani, Pitamber Shukla, Scott Anthony Stoller, Niccolo' Righetti
-
Publication number: 20240124490Abstract: Disclosed herein are compounds that are Hematopoietic Progenitor Kinase 1 (HPK1) inhibitors having a structure according to Formula I, and compositions containing those compounds. Methods of preparing the compounds, and methods of using the compounds for the treatment of diseases, disorders, or conditions are also described.Type: ApplicationFiled: July 6, 2023Publication date: April 18, 2024Applicant: Arcus Biosciences, Inc.Inventors: Joshua R. Corbin, Sandeep Dhanju, Corinne Nicole Foley, Jeremy Fournier, Padmanabha V. Kattamuri, Manmohan Reddy Leleti, Pradeep Nareddy, Jay Patrick Powers, Ehesan Ul Sharif, Joice Thomas
-
Publication number: 20240122858Abstract: Modified-release pharmaceutical compositions of ruxolitinib or a pharmaceutically acceptable salt thereof are disclosed. Preferably, the invention relates to oral modified-release pharmaceutical compositions of ruxolitinib, which enable once-daily administration. Oral modified-release compositions of ruxolitinib, methods for their administration, processes for their preparation, and use of these compositions for treatment of diseases treatable by ruxolitinib are also described.Type: ApplicationFiled: December 7, 2023Publication date: April 18, 2024Applicant: SLAYBACK PHARMA LLCInventors: Paras P. JAIN, Krishna Mohan LAKSHMIPATHULA, Somnath Devidas NAVGIRE, Hanimi Reddy BAPATU, Sandeep JAIN, Sumitra Ashokkumar PILLAI, Praveen Kumar SUBBAPPA
-
Publication number: 20240121232Abstract: A method for facilitating application authentication bypass based on proximate with time using device authentication is disclosed. The method includes receiving a request from a user to access an application on a user device, the request including an application authentication request; accessing the user device via a device application programming interface; retrieving, via the device application programming interface, device authentication data, the device authentication data including a timeline of successful device authentications; determining whether the device authentication data is within a predetermined threshold; authenticating the request by using the device authentication data when the device authentication data is within the predetermined threshold; and permitting access to the application based on a result of the authenticating.Type: ApplicationFiled: October 11, 2022Publication date: April 11, 2024Applicant: JPMorgan Chase Bank, N.A.Inventors: Goran LONCARIC, Mimi WANG, Sandeep Reddy BANALA, Bipin MORE
-
Patent number: 11943209Abstract: In the IKE or IPSec SA rekeying, whether the rekey exchange includes the cryptographic suite in the payload depends on whether the cryptographic suite used in the old SA is changed on both ends, e.g., the initiator and the responder. If the cryptographic suite is not changed, then the rekey exchange does not include the cryptographic suite. Additionally, in the IPSec SA rekey, if the flowing information is not changed in either end, the rekey exchange further does not include the Traffic Selector (TS). As such, the size of the payload is decreased, which saves bandwidth, more processing time and power in the course of the IKE SA or the IPSec SA rekey.Type: GrantFiled: May 17, 2021Date of Patent: March 26, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Sandeep Kampati, Bharath Soma Satya Meduri, Dharmanandana Reddy Pothula, De Sheng
-
Publication number: 20240098580Abstract: The present technology is generally directed to optimizing a non-3GPP untrusted Wi-Fi to 5G system handover followed by Evolved Packet System (EPS) fallback, more specifically, to delaying removal of the Wi-Fi session resources and creating a voice flow as part of the EPS fallback.Type: ApplicationFiled: November 22, 2023Publication date: March 21, 2024Inventors: Raghunadha Reddy Pocha, Mantha Ravi Shankar, Jis Abraham, Sandeep Dasgupta, Mukesh Yadav
-
Publication number: 20240020020Abstract: A set of threshold voltage distribution width measurements are obtained for a block in a memory device. An endurance estimate is determined for the block based on the threshold voltage distribution width measurements. The endurance estimate comprises an indication of an estimated number of program/erase cycles during which data can be reliably stored by the block. One or more parameters of the block are managed based on the endurance estimate.Type: ApplicationFiled: July 18, 2022Publication date: January 18, 2024Inventors: Sandeep Reddy Kadasani, Pitamber Shukla, Scott Anthony Stoller, Niccolo' Righetti
-
Publication number: 20230362191Abstract: Obtain, by a controller, from at least one provisioning database of an internet service provider, assigned bandwidth per customer for a plurality of internet service provider customers. Obtain, by the controller, from a plurality of peering entry points of the internet service provider, currently used bandwidth per customer for the plurality of internet service provider customers. Compare, by the controller, for the plurality of internet service provider customers, the assigned bandwidth per customer to the currently used bandwidth per customer, to determine at least one given customer of the plurality of internet service provider customers putatively suffering from a distributed denial of service attack. Initiate at least one remedial action for the at least one given customer of the plurality of internet service provider customers putatively suffering from the distributed denial of service attack.Type: ApplicationFiled: May 5, 2022Publication date: November 9, 2023Inventor: SANDEEP REDDY MEREDDY
-
Publication number: 20230319566Abstract: A method for extended authentication sessions on an electronic device may include an authentication service computer program executed by an authentication service electronic device: receiving a customer identifier for a customer and a unique identifier for a mobile electronic device; authenticating the customer based on the customer identifier and the unique identifier for the mobile electronic device; setting a device cookie that is specific to the mobile electronic device on the mobile electronic device; and providing the device cookie and a client secret to an OAuth services backend, wherein the OAuth services backend validates the customer identifier and client secret and generates a first token and a second token, the first token having an expiration that is shorter than that of the second token. The mobile electronic device is configured to receive and store the first token and the second token.Type: ApplicationFiled: May 19, 2022Publication date: October 5, 2023Inventors: Jasbir BANGA, Ryan S YODER, Mizan MIAH, Muralidhar SOMAPALLI, Neill CLAYTON-SMITH, Reetu BOK, Sandeep Reddy BANALA, Scott R MOSER, Bipin MORE, Suresh MADHAVAN
-
Publication number: 20230297723Abstract: Password-less authentication and login onto an application are disclosed. A processor extracts Digital Driver's License (DDL) data from a user's computing device; extracts the DDL data of the user from an external database (i.e., DMV); validates the DDL data by comparing with the DDL data from the external database; creates, in response to validating, a DDL secret private key; allows successful registration of the computing device to utilize DDL data for login; and stores the DDL secret private key onto an internal database and a secured environment of the computing device. At login request by the user, when the processor determines that the computing device is successfully registered, it validates the DDL secret private key by comparing with data from the internal database; creates a new DDL secret private key and updates the internal database and the secured environment with the new DDL secret private key for subsequent login.Type: ApplicationFiled: March 18, 2022Publication date: September 21, 2023Applicant: JPMorgan Chase Bank, N.A.Inventors: Kumar RAO KRISHNAGI, Stefan SCHUBERT, Suresh MADHAVAN, Sandeep Reddy BANALA
-
Publication number: 20230289225Abstract: A scalable Internet of Things (IoT) system may include multiple instances of an IoT manager, each instance respectively configured to connect to a respective edge system of multiple edge systems. The IoT system may further include a containerized system configured to allow any instance of the IoT manager to deploy data pipelines to any edge system of the multiple edge systems in delta communications. Any instance of the IoT manager may send a change message to any edge system via a publish/subscribe notification method. In some examples, a centralized IoT manager may form a secure communication with an edge system, synchronize an object model with an edge object model for the edge system, and maintain the edge system using delta change communications. The IoT system may facilitate any instance of the IoT manager to subscribe a communication channel with an associated edge system for receiving update notification.Type: ApplicationFiled: March 16, 2023Publication date: September 14, 2023Applicant: NUTANIX, INC.Inventors: Naorem Khogendro Singh, Sandeep Reddy Goli, Satyam B. Vaghani, Shyan-Ming Perng
-
Patent number: 11693587Abstract: A read operation is performed on a memory device in accordance with a pass-through voltage setting that defines a pass-through voltage applied to one or more cells of the memory device during read operations. A number of zero bits read from the memory device based on the read operation are counted and compared with a threshold value. Based on the number of zero bits exceeding the threshold value, the pass-through voltage is increased by adjusting the pass-through voltage setting.Type: GrantFiled: August 17, 2021Date of Patent: July 4, 2023Assignee: Micron Technology, Inc.Inventors: Sandeep Reddy Kadasani, Scott Anthony Stoller, Pitamber Shukla, Niccolo' Righetti, Chi Ming Chu
-
Patent number: 11646963Abstract: Methods and systems for a multiple domain quality of service software-defined networking (SDN) controller are described. A method includes discovering network devices in a network, collecting traffic flow data from each of the discovered network devices, collecting configuration and operational data from each of the discovered network devices, categorizing the traffic flow data into traffic flow types for presentation as a first level view, determining source and destination pairs for each traffic flow in each of the traffic flow types for presentation as a second level view, generating network device micro-topologies for each of the source and destination pairs for presentation as a third level view, mapping at least one network device characteristic for each network device in each network device micro-topology for presentation as a fourth level view, and performing corrective measures on network devices identified for issues from the presented network device characteristics.Type: GrantFiled: November 8, 2021Date of Patent: May 9, 2023Assignee: Charter Communications Operating, LLCInventor: Sandeep Reddy Mereddy
-
Patent number: 11641325Abstract: Various embodiments comprise systems, methods, architectures, mechanisms and apparatus for controlling Quality of Service (QoS) within a service provider network by retrieving from the network QoS related data, processing the retrieved QoS related data via one or more time series prediction algorithm to determine QoS prediction data, and responsively generating network management or configuration commands adapted to ensure continued services delivery in accordance with QoS requirements.Type: GrantFiled: July 23, 2020Date of Patent: May 2, 2023Assignee: CHARTER COMMUNICATIONS OPERATING, LLCInventor: Sandeep Reddy Mereddy
-
Patent number: 11635990Abstract: A scalable Internet of Things (IoT) system may include multiple instances of an IoT manager, each instance respectively configured to connect to a respective edge system of multiple edge systems. The IoT system may further include a containerized system configured to allow any instance of the IoT manager to deploy data pipelines to any edge system of the multiple edge systems in delta communications. Any instance of the IoT manager may send a change message to any edge system via a publish/subscribe notification method. In some examples, a centralized IoT manager may form a secure communication with an edge system, synchronize an object model with an edge object model for the edge system, and maintain the edge system using delta change communications. The IoT system may facilitate any instance of the IoT manager to subscribe a communication channel with an associated edge system for receiving update notification.Type: GrantFiled: October 28, 2019Date of Patent: April 25, 2023Assignee: Nutanix, Inc.Inventors: Naorem Khogendro Singh, Sandeep Reddy Goli, Satyam B. Vaghani, Shyan-Ming Perng
-
Patent number: 11618743Abstract: Compounds of the formula (I) wherein the substituents are as defined in claim 1, useful as a pesticides, especially as herbicides.Type: GrantFiled: August 16, 2018Date of Patent: April 4, 2023Assignee: SYNGENTA PARTICIPATIONS AGInventors: James Nicholas Scutt, Nigel James Willetts, Ravindra Sonawane, Mangala Phadte, Sandeep Reddy Kandukuri, Swarnendu Sasmal, Sarah Armstrong, Andrea McGranaghan, Sean Ng
-
Publication number: 20230054688Abstract: A computer implemented method for determining graphical user interface, GUI, interaction information for an end user device is described. The method comprising analysing device state information using one or more GUI spying modes to estimate GUI interaction information for the one or more GUI spying modes; classifying the estimated GUI interaction information for the one or more GUI spying modes based on a reference model; and outputting GUI interaction information based on the classification results.Type: ApplicationFiled: August 18, 2022Publication date: February 23, 2023Inventors: Krishna Sandeep Reddy DUBBA, Benjamin Michael CARR, Ümit Rusen AKTAS, Thomas Alexander CHILES
-
Publication number: 20230058645Abstract: A read operation is performed on a memory device in accordance with a pass-through voltage setting that defines a pass-through voltage applied to one or more cells of the memory device during read operations. A number of zero bits read from the memory device based on the read operation are counted and compared with a threshold value. Based on the number of zero bits exceeding the threshold value, the pass-through voltage is increased by adjusting the pass-through voltage setting.Type: ApplicationFiled: August 17, 2021Publication date: February 23, 2023Inventors: Sandeep Reddy Kadasani, Scott Anthony Stoller, Pitamber Shukla, Niccolo' Righetti, Chi Ming Chu
-
Publication number: 20230040974Abstract: The present invention relates to a computer-implemented method for obscuring sensitive data. The method comprises: acquiring, by a processor, image data; extracting, by the processor, structured data from the image data, the structured data being sensitive data and having a defined functional format and a defined visual format; generating, by the processor, artificial data that is different from the structured data, the artificial data having the same functional format as the structured data; generating, by the processor, artificial image data based on the image data in which the structured data is replaced with the artificial data, the artificial data being based on the visual format of the structured data; and outputting, by the processor, the artificial image data.Type: ApplicationFiled: August 5, 2022Publication date: February 9, 2023Inventors: De ZHANG, Krishna Sandeep Reddy DUBBA